Announcement
Collapse
No announcement yet.
Decrypting a Hash Password.
Collapse
X
-
thanks for all your support every1. I did alot of reasearch on my own, but when you hit that wall you need some help. And yall have done just that, thanks again every1. love the forum : ]
-
Originally posted by TheCotManI've grown to like:
"(s)he who knows not, and knows not how to research is ingnorant and deserves to be ignored."
It's like telling people to 'google it' and having them reply with, "google did not help," or, "google did not return anything." When you verify that google does help, you know they are unwilling or unable to research.
Exactly my point earlier...the concepts behind hashes should be easy to get from Google...pretty standard info. I usually don't like the 'give me the answer' people, but prefer the 'help me get the answer, I'm working on it but I'm stuck' people. I always strive to be that kind of a person when seeking help.
LosT
Leave a comment:
-
Take a look at rainbowcrack, it uses rainbow tables to bruteforce hashes.
http://www.antsight.com/zsl/rainbowcrack/
Leave a comment:
-
Originally posted by Floydr47show me a man who claims to know everthing there is to know and I'll show you a damned liar.
Oracle: I AM THE GREAT ORACLE OF DELPHI! I KNOW EVERYTHING YOU NEED TO KNOW! ASK ME A QUESTION!
Curious Human 1: Could ask any question on any topic?
Oracle: YES.
Curious Human 1: Oh! What are the lottery numbers tomorrow?
Oracle: YOU ASKED YOUR QUESTION. NEXT!
Oracle: I AM THE GREAT ORACLE OF DELPHI! I KNOW EVERYTHING YOU NEED TO KNOW! ASK ME A QUESTION!
Curious Human 2: What will the score of the game tomorrow be, before it starts?
Oracle: ZERO TO ZERO! NEXT!
Oracle: I AM THE GREAT ORACLE OF DELPHI! I KNOW EVERYTHING YOU NEED TO KNOW! ASK ME A QUESTION!
Curious Human 3: How can I know as much as you, Great Oracle?
Oracle: YOU DON'T NEED TO KNOW THAT!
Originally posted by badkarma..."He who knows not ..."
"(s)he who knows not, and knows not how to research is ingnorant and deserves to be ignored."
It's like telling people to 'google it' and having them reply with, "google did not help," or, "google did not return anything." When you verify that google does help, you know they are unwilling or unable to research.Last edited by TheCotMan; April 5, 2005, 09:47.
Leave a comment:
-
As far as being confusing, many things about computers are confusing to me, usually however, after logical discussion they seem to be more clear
It is true that reading maketh a full man.
...reminds me of the men of four.
"He who knows not and knows not that he knows not is a fool; shun him.
He who knows not and knows that he knows not is a child; teach him.
He who knows but knows not that he knows is asleep; wake him.
He who knows and knows that he knows is wise; follow him."
BK
Leave a comment:
-
Originally posted by LosTHehhee, true, but if they are having problems with something like simple one way hashes, then RSA would be totally confusing...I cross what? Where? Huh? ;)
LosT
Leave a comment:
-
Originally posted by Voltage SpikeBah! RSA is the easy one (especially for mathmagicians). I could explain it to someone in less than an hour.
Proving it, though...
Hehhee, true, but if they are having problems with something like simple one way hashes, then RSA would be totally confusing...I cross what? Where? Huh? ;)
LosT
Leave a comment:
-
Originally posted by LosTYou think that is bad, lets really start confusing people and explaining the RSA algs for encryption...
Proving it, though...
Leave a comment:
-
You think that is bad, lets really start confusing people and explaining the RSA algs for encryption... ;)
LosT
Leave a comment:
-
wow...thanks for the reply's all. Thats exactly what I was needing.....thanks a bunch every1.
Leave a comment:
-
Originally posted by Floydr47Would the hash for "bannana" remain the same whether it was, say for instance, an AOL password or an MSN password or would each create it's own hash?
Note that if the hashing technique is the same, obtaining the hash may be as good as obtaining the password. Some applications go out of their way to avoid this problem by adding, for example, the application name or the name of the authenticating server. This is merely a more advanced technique of salting (also called nonce depending on the context).
Originally posted by Floydr47If the hash changed from one to the other then the theory of hashing a dictionary + 2 wouldn't hold water would it?
Leave a comment:
-
Originally posted by astcellSQL may be overkill but it will be faster with a big dictionary of course. So, who'se up to it?
Similar techniques were used in the "Early days" when trying to break WEP before flaws in the original protocol were exposed.
Since Proofs Of Concept have been made available, the act of using a larger dictionary is only limited by resources available. Also, this problem lends itself very well to using distributed computing in an attack and can scale very well.
Your target is someone with lots of memory and disk space, or a farm of systems they can (ab)use with a total of free-space and RAM that is large and some coding or DB skills.Last edited by TheCotMan; April 3, 2005, 22:50.
Leave a comment:
-
Would the hash for "bannana" remain the same whether it was, say for instance, an AOL password or an MSN password or would each create it's own hash? If the hash changed from one to the other then the theory of hashing a dictionary + 2 wouldn't hold water would it? I mean the English language contains some 68,000 +/- words and a hash system would contain an infinite number of combinations...not being a smart ass, just thinking out loud.
Leave a comment:
-
SQL may be overkill but it will be faster with a big dictionary of course. So, who'se up to it?
Leave a comment:
-
Originally posted by astcellHmmm, the only thing needed would be a small coded algorithm which would read one file,maybe a .txt file, then generate the hashed password in a comma delimited file.
Is this called warhashing?
[Maybe I should start war-sleeping. heh heh hrm. yeah!]
Leave a comment:
Leave a comment: